Andreas
Andreas
@andreas@nomorecubes.net
2,661 posts
4 followers
  • Recovery Strategies

    Alternative on-site venues: Temporarily using meeting rooms, training labs, or cafeterias to support business functions. Reciprocation: Agreements with similar, unaffected organizations to use their facilities in the event of a […]

  • Considerations for the planning phase: Business Continuity

    National and industry-specific laws and general business standards must be taken into account. The staffing, funding, and other resources required to develop the plan must be identified. The results of […]

  • Items to consider work potentially lost

    How quickly work in progress will need to be restored to workstations at an alternative site The amout of work that can tolerably be lost without harming the organization

  • SoftWare Engineering Body of Knowledge v3

    The Ballot version of the complete SWEBOK Guide V3 has been finalized and is now available. Everyone is invited to read the manuscript and to view the report of collected […]

  • Project Initiation Phase: Business Continuity Plan

    Secure commitment of departmental leaders who’ll be responsible for implementing the BCP. Pursuade senior management of the importance of having a BCP. Outline a timeline for developing a comprehensive continuity […]

  • Categories of Laws

    Tort Law England and Wales Deals with individuals and their rights and obligations under the law Mixed Law Forms the basis of the legal system in Holland, Quebec, Louisiana, South […]

  • Computer related crime characteristics

    Trap doors – potential offenders are system and application programmers Trojan horses, viruses, worms, salamis and logic bombs – can be detected by comparing program code with backup copies of […]

  • Intellectual Property Laws

    Copyrights Example: A marketing / design company wants to restrict usage of designs it created. Trademarks Example: A company wants exclusive rights to use a particular logo or slogan. Trade […]

  • Categories of Computer Crimes

    Breach of data security: Information stored on network or computers is altered by attackers. Breach of operations security: Attackers take advantage of vulnerabilities within daily procedures to access or alter […]

  • Laws related to privacy

    Freedom of Information Act, 5 U.S.C. §552, as amended Guidance on Integrity Sharing of personal data – protecting personal privacy, OMB Memorandum, M-01-05 Gramm-Leach-Bliley Act of 1999